Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-6677-0.CH005
Renata Wong, A. Bhatia
In the last two decades, the interest in quantum computation has increased significantly among research communities. Quantum computing is the field that investigates the computational power and other properties of computers on the basis of the underlying quantum-mechanical principles. The main purpose is to find quantum algorithms that are significantly faster than any existing classical algorithms solving the same problem. While the quantum computers currently freely available to wider public count no more than two dozens of qubits, and most recently developed quantum devices offer some 50-60 qubits, quantum computer hardware is expected to grow in terms of qubit counts, fault tolerance, and resistance to decoherence. The main objective of this chapter is to present an introduction to the core quantum computing algorithms developed thus far for the field of cryptography.
{"title":"Quantum Algorithms","authors":"Renata Wong, A. Bhatia","doi":"10.4018/978-1-7998-6677-0.CH005","DOIUrl":"https://doi.org/10.4018/978-1-7998-6677-0.CH005","url":null,"abstract":"In the last two decades, the interest in quantum computation has increased significantly among research communities. Quantum computing is the field that investigates the computational power and other properties of computers on the basis of the underlying quantum-mechanical principles. The main purpose is to find quantum algorithms that are significantly faster than any existing classical algorithms solving the same problem. While the quantum computers currently freely available to wider public count no more than two dozens of qubits, and most recently developed quantum devices offer some 50-60 qubits, quantum computer hardware is expected to grow in terms of qubit counts, fault tolerance, and resistance to decoherence. The main objective of this chapter is to present an introduction to the core quantum computing algorithms developed thus far for the field of cryptography.","PeriodicalId":169483,"journal":{"name":"Limitations and Future Applications of Quantum Cryptography","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133759028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-6677-0.CH001
S. Billewar, G. Londhe, Sunil Ghane
History repeats itself. Quantum cryptography has started a revolution of quantum computing and has repeated the days of Einstein's research paper on “Theory of Relativity,” which changed the world's perceptions of physics completely written based on Newton's laws. Quantum cryptography is going to change the definition of computers right from scratch. The last century was witness of a space race between US and USSR. This century would be witness of quantum computing race between US and China. It has changed the dimensions of operating systems, software, hardware, databases, and applications. Quantum computers are in a phase to replace the conventional computers and they are reaching to the level called quantum supremacy. The chapter covers the details of the basic principles and work methodology of quantum cryptography, the contribution of various pioneers, advantages over classical cryptography, its applications, future scope, and limitations simultaneously. The chapter covers the contribution of leading countries and organizations in quantum revolution.
{"title":"Quantum Cryptography","authors":"S. Billewar, G. Londhe, Sunil Ghane","doi":"10.4018/978-1-7998-6677-0.CH001","DOIUrl":"https://doi.org/10.4018/978-1-7998-6677-0.CH001","url":null,"abstract":"History repeats itself. Quantum cryptography has started a revolution of quantum computing and has repeated the days of Einstein's research paper on “Theory of Relativity,” which changed the world's perceptions of physics completely written based on Newton's laws. Quantum cryptography is going to change the definition of computers right from scratch. The last century was witness of a space race between US and USSR. This century would be witness of quantum computing race between US and China. It has changed the dimensions of operating systems, software, hardware, databases, and applications. Quantum computers are in a phase to replace the conventional computers and they are reaching to the level called quantum supremacy. The chapter covers the details of the basic principles and work methodology of quantum cryptography, the contribution of various pioneers, advantages over classical cryptography, its applications, future scope, and limitations simultaneously. The chapter covers the contribution of leading countries and organizations in quantum revolution.","PeriodicalId":169483,"journal":{"name":"Limitations and Future Applications of Quantum Cryptography","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121428348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-6677-0.CH003
S. Lakshmi, S. Krishnamoorthy, Mudassir Khan, N. Kumar, V. Sahni
Cryptography is used for the secure communication in which two parties are involved. The most popular cryptographic issue is the transmission of confidential messages. The privacy is maintained using the cryptographic protocol. The security of quantum cryptography relies more on physics including quantum mechanics and statistics rather than on solving mathematical problems. A well-known application of quantum cryptography is quantum key distribution (QKD) that is used to establish communication by generating cryptographic keys. Moreover, it is based on the Heisenberg uncertainty principle that ensures the security and prevents from eavesdropping. Basically, quantum cryptography with faint laser pulses, polarization coding, phase coding, and frequency coding have been discussed.
{"title":"Quantum Cryptography","authors":"S. Lakshmi, S. Krishnamoorthy, Mudassir Khan, N. Kumar, V. Sahni","doi":"10.4018/978-1-7998-6677-0.CH003","DOIUrl":"https://doi.org/10.4018/978-1-7998-6677-0.CH003","url":null,"abstract":"Cryptography is used for the secure communication in which two parties are involved. The most popular cryptographic issue is the transmission of confidential messages. The privacy is maintained using the cryptographic protocol. The security of quantum cryptography relies more on physics including quantum mechanics and statistics rather than on solving mathematical problems. A well-known application of quantum cryptography is quantum key distribution (QKD) that is used to establish communication by generating cryptographic keys. Moreover, it is based on the Heisenberg uncertainty principle that ensures the security and prevents from eavesdropping. Basically, quantum cryptography with faint laser pulses, polarization coding, phase coding, and frequency coding have been discussed.","PeriodicalId":169483,"journal":{"name":"Limitations and Future Applications of Quantum Cryptography","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122326406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}